The characteristics and operations of some of the malicious software

  What are some of the characteristics and operations of some of the malicious software that exists today?